--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2013-1003
2013-01-20 02:01:38
--------------------------------------------------------------------------------
Name : asterisk
Product : Fedora 18
Version : 11.2.0
Release : 1.fc18
URL : http://www.asterisk.org/
Summary : The Open Source PBX
Description :
Asterisk is a complete PBX in software. It runs on Linux and provides
all of the features you would expect from a PBX and more. Asterisk
does voice over IP in three protocols, and can interoperate with
almost all standards-based telephony equipment using relatively
inexpensive hardware.
--------------------------------------------------------------------------------
Update Information:
The Asterisk Development Team has announced the release of Asterisk
11.2.0.
This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk
The release of Asterisk 11.2.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!
The following is a sample of the issues resolved in this release:
* --- app_meetme: Fix channels lingering when hung up under certain
conditions
(Closes issue ASTERISK-20486. Reported by Michael Cargile)
* --- Fix stuck DTMF when bridge is broken.
(Closes issue ASTERISK-20492. Reported by Jeremiah Gowdy)
* --- Add missing support for "who hung up" to chan_motif.
(Closes issue ASTERISK-20671. Reported by Matt Jordan)
* --- Remove a fixed size limitation for producing SDP and change how
ICE support is disabled by default.
(Closes issue ASTERISK-20643. Reported by coopvr)
* --- Fix chan_sip websocket payload handling
(Closes issue ASTERISK-20745. Reported by Iñaki Baz Castillo)
* --- Fix pjproject compilation in certain circumstances
(Closes issue ASTERISK-20681. Reported by Dinesh Ramjuttun)
For a full list of changes in this release, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.2.0
The Asterisk Development Team has announced a security release for Asterisk
11,
Asterisk 11.1.2. This release addresses the security vulnerabilities
reported in
AST-2012-014 and AST-2012-015, and replaces the previous version of
Asterisk 11
released for these security vulnerabilities. The prior release left open a
vulnerability in res_xmpp that exists only in Asterisk 11; as such, other
versions of Asterisk were resolved correctly by the previous releases.
This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of these versions resolve the following two issues:
* Stack overflows that occur in some portions of Asterisk that manage a
TCP
connection. In SIP, this is exploitable via a remote unauthenticated
session;
in XMPP and HTTP connections, this is exploitable via remote
authenticated
sessions. The vulnerabilities in SIP and HTTP were corrected in a prior
release of Asterisk; the vulnerability in XMPP is resolved in this
release.
* A denial of service vulnerability through exploitation of the device
state
cache. Anonymous calls had the capability to create devices in Asterisk
that
would never be disposed of. Handling the cachability of device states
aggregated via XMPP is handled in this release.
These issues and their resolutions are described in the security
advisories.
For more information about the details of these vulnerabilities, please
read
security advisories AST-2012-014 and AST-2012-015.
For a full list of changes in the current release, please see the
ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.2
The security advisories are available at:
* http://downloads.asterisk.org/pub/security/AST-2012-014.pdf
* http://downloads.asterisk.org/pub/security/AST-2012-015.pdf
Thank you for your continued support of Asterisk - and we apologize for
having
to do this twice!
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jan 18 2013 Jeffrey Ollie <[email protected]> - 11.2.0-1:
- The Asterisk Development Team has announced the release of Asterisk
11.2.0.
- This release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk
-
- The release of Asterisk 11.2.0 resolves several issues reported by the
- community and would have not been possible without your participation.
- Thank you!
-
- The following is a sample of the issues resolved in this release:
-
- * --- app_meetme: Fix channels lingering when hung up under certain
- conditions
- (Closes issue ASTERISK-20486. Reported by Michael Cargile)
-
- * --- Fix stuck DTMF when bridge is broken.
- (Closes issue ASTERISK-20492. Reported by Jeremiah Gowdy)
-
- * --- Add missing support for "who hung up" to chan_motif.
- (Closes issue ASTERISK-20671. Reported by Matt Jordan)
-
- * --- Remove a fixed size limitation for producing SDP and change how
- ICE support is disabled by default.
- (Closes issue ASTERISK-20643. Reported by coopvr)
-
- * --- Fix chan_sip websocket payload handling
- (Closes issue ASTERISK-20745. Reported by Iñaki Baz Castillo)
-
- * --- Fix pjproject compilation in certain circumstances
- (Closes issue ASTERISK-20681. Reported by Dinesh Ramjuttun)
-
- For a full list of changes in this release, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.2.0
* Thu Jan 3 2013 Jeffrey Ollie <[email protected]> - 11.1.2-1:
- The Asterisk Development Team has announced a security release for
Asterisk 11,
- Asterisk 11.1.2. This release addresses the security vulnerabilities
reported in
- AST-2012-014 and AST-2012-015, and replaces the previous version of
Asterisk 11
- released for these security vulnerabilities. The prior release left open
a
- vulnerability in res_xmpp that exists only in Asterisk 11; as such, other
- versions of Asterisk were resolved correctly by the previous releases.
-
- This release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of these versions resolve the following two issues:
-
- * Stack overflows that occur in some portions of Asterisk that manage a
TCP
- connection. In SIP, this is exploitable via a remote unauthenticated
session;
- in XMPP and HTTP connections, this is exploitable via remote
authenticated
- sessions. The vulnerabilities in SIP and HTTP were corrected in a prior
- release of Asterisk; the vulnerability in XMPP is resolved in this
release.
-
- * A denial of service vulnerability through exploitation of the device
state
- cache. Anonymous calls had the capability to create devices in Asterisk
that
- would never be disposed of. Handling the cachability of device states
- aggregated via XMPP is handled in this release.
-
- These issues and their resolutions are described in the security
advisories.
-
- For more information about the details of these vulnerabilities, please
read
- security advisories AST-2012-014 and AST-2012-015.
-
- For a full list of changes in the current release, please see the
ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.2
-
- The security advisories are available at:
-
- * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf
- * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf
-
- Thank you for your continued support of Asterisk - and we apologize for
having
- to do this twice!
* Wed Jan 2 2013 Jeffrey Ollie <[email protected]> - 11.1.1-1:
- The Asterisk Development Team has announced security releases for
Certified
- Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security
releases
- are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1,
10.11.1-digiumphones,
- and 11.1.1.
-
- These releases are available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of these versions resolve the following two issues:
-
- * Stack overflows that occur in some portions of Asterisk that manage a
TCP
- connection. In SIP, this is exploitable via a remote unauthenticated
session;
- in XMPP and HTTP connections, this is exploitable via remote
authenticated
- sessions.
-
- * A denial of service vulnerability through exploitation of the device
state
- cache. Anonymous calls had the capability to create devices in Asterisk
that
- would never be disposed of.
-
- These issues and their resolutions are described in the security
advisories.
-
- For more information about the details of these vulnerabilities, please
read
- security advisories AST-2012-014 and AST-2012-015, which were released at
the
- same time as this announcement.
-
- For a full list of changes in the current releases, please see the
ChangeLogs:
-
- http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-1.8.11-cert10
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.19.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.11.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.11.1-digiumphones
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1
-
- The security advisories are available at:
-
- * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf
- * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf
* Wed Dec 12 2012 Jeffrey Ollie <[email protected]> - 11.1.0-1:
- The Asterisk Development Team has announced the release of Asterisk
11.1.0.
- This release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk
-
- The release of Asterisk 11.1.0 resolves several issues reported by the
- community and would have not been possible without your participation.
- Thank you!
-
- The following is a sample of the issues resolved in this release:
-
- * --- Fix execution of 'i' extension due to uninitialized variable.
- (Closes issue ASTERISK-20455. Reported by Richard Miller)
-
- * --- Prevent resetting of NATted realtime peer address on reload.
- (Closes issue ASTERISK-18203. Reported by daren ferreira)
-
- * --- Fix ConfBridge crash if no timing module loaded.
- (Closes issue ASTERISK-19448. Reported by feyfre)
-
- * --- Fix the Park 'r' option when a channel parks itself.
- (Closes issue ASTERISK-19382. Reported by James Stocks)
-
- * --- Fix an issue where outgoing calls would fail to establish audio
- due to ICE negotiation failures.
- (Closes issue ASTERISK-20554. Reported by mmichelson)
-
- For a full list of changes in this release, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.1.0
* Fri Dec 7 2012 Jeffrey Ollie <[email protected]> - 11.0.2-1:
- The Asterisk Development Team has announced the release of Asterisk
11.0.2.
- This release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk
-
- The release of Asterisk 11.0.2 resolves an issue reported by the
- community and would have not been possible without your participation.
- Thank you!
-
- The following is the issue resolved in this release:
-
- * --- chan_local: Fix local_pvt ref leak in local_devicestate().
- (Closes issue ASTERISK-20769. Reported by rmudgett)
-
- For a full list of changes in this release, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.0.2
* Wed Dec 5 2012 Dan Horák - 11.0.1-3
- simplify LDFLAGS setting
* Fri Nov 30 2012 Dennis Gilmore - 11.0.1-2
- clean up things to allow building on arm arches
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #891646 - CVE-2012-5976 asterisk: Crashes due to large stack
allocations when using TCP (AST-2012-014)
https://bugzilla.redhat.com/show_bug.cgi?id=891646
[ 2 ] Bug #891649 - CVE-2012-5977 asterisk: Denial of service through
exploitation of device state caching (AST-2012-015)
https://bugzilla.redhat.com/show_bug.cgi?id=891649
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update asterisk' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on
the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
[email protected]https://admin.fedoraproject.org/mailman/listinfo/package-announce